Introduction
Do you use Siri? What about Google Home or the Amazon Alexa? Some other, similar smart device hooked up to your home or office? Then you’ll want to read on about this latest vulnerability in your network.
Researchers at the University of Texas San Antonio and University of Colorado Colorado Springs have discovered a potential malware technique capable of sneaking onto voice-controlled devices to take control of the system or network.


